Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco application velocity system vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2006-2322
The transparent proxy feature of the Cisco Application Velocity System (AVS) 3110 5.0 and 4.0 and previous versions, and 3120 5.0.0 and previous versions, has a default configuration that allows remote malicious users to proxy arbitrary TCP connections, aka Bug ID CSCsd32143.
Cisco Application Velocity System 3110 4.0
Cisco Application Velocity System 3110 5.0
Cisco Application Velocity System 3120 5.0
5.8
CVSSv2
CVE-2009-3555
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and previous versions, OpenSSL prior to 0.9.8l, GnuTLS 2.8.5 and previous versions, Mozilla Network Security Ser...
Openssl Openssl 1.0
Apache Http Server
Openssl Openssl
Gnu Gnutls
Mozilla Nss
Debian Debian Linux 5.0
Canonical Ubuntu Linux 10.10
Fedoraproject Fedora 11
Fedoraproject Fedora 13
Debian Debian Linux 4.0
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 9.04
Debian Debian Linux 6.0
Fedoraproject Fedora 12
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.10
Fedoraproject Fedora 14
F5 Nginx
2 EDB exploits
10 Github repositories
10
CVSSv2
CVE-2008-0029
Cisco Application Velocity System (AVS) prior to 5.1.0 is installed with default passwords for some system accounts, which allows remote malicious users to gain privileges.
Cisco Application Velocity System
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started